27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

8.2.2 Intrusi<strong>on</strong> Detecti<strong>on</strong> and Preventi<strong>on</strong> Systems<br />

An IDS is an applicati<strong>on</strong> that m<strong>on</strong>itors the events occurring in a system or network and analyzes them for<br />

signs of potential incidents, which are violati<strong>on</strong>s or imminent threats of violati<strong>on</strong> of computer security<br />

policies, acceptable use policies, or standard security practices. 68 An IPS has all the capabilities of an<br />

IDS and can also attempt to stop potential incidents. Because IDS and IPS systems offer many of the<br />

same capabilities, they are often collectively called intrusi<strong>on</strong> detecti<strong>on</strong> and preventi<strong>on</strong> systems (IDPS).<br />

When an IDPS detects a potential incident, it notifies administrators through IDPS c<strong>on</strong>sole messages,<br />

emails, pages, or other mechanisms.<br />

The two types of IDPSs most relevant for <strong>Web</strong> security are host-based and network-based. 69 A hostbased<br />

IDPS m<strong>on</strong>itors the characteristics of a single host and the events occurring within that host to<br />

identify and stop suspicious activity. Host-based IDPS software must be installed <strong>on</strong> each individual<br />

computer that is to be m<strong>on</strong>itored or protected. Host-based IDPSs are very closely integrated with the OSs<br />

of the host computers they protect. Thus, a host-based IDPS must be designed specifically for each OS<br />

(and often each versi<strong>on</strong> of that OS). Host-based IDPSs m<strong>on</strong>itor various aspects of hosts, such as network<br />

traffic, system logs, running processes, file access and modificati<strong>on</strong>, and system and applicati<strong>on</strong><br />

c<strong>on</strong>figurati<strong>on</strong> changes.<br />

Host-based IDPSs are especially useful when most of the network traffic to and from a <strong>Web</strong> server is<br />

encrypted (e.g., SSL/TLS is in use) because the functi<strong>on</strong>ality and capability of network-based IDPSs (see<br />

below) is severely limited when network traffic is encrypted. Also, because they are located <strong>on</strong> the<br />

server, host-based IDPSs can detect some attacks and penetrati<strong>on</strong> attempts not recognized by networkbased<br />

IDPSs. Unfortunately, host-based IDPSs can have a negative effect <strong>on</strong> host performance. In<br />

general, enabling more extensive detecti<strong>on</strong> capabilities and having more events to m<strong>on</strong>itor both have a<br />

negative impact <strong>on</strong> the performance of the host. Host-based IDPSs may not detect some network-based<br />

attacks, such as certain DoS attacks. If a host-based IDPS is <strong>on</strong> a <strong>Web</strong> server that is compromised, it is<br />

very likely that the attacker will also compromise the IDPS itself.<br />

A network-based IDPS m<strong>on</strong>itors network traffic for particular network segments or network devices and<br />

analyzes the network and applicati<strong>on</strong> protocol activity to identify and stop suspicious activity. Most<br />

network-based IDPSs use predefined “attack signatures” to detect and identify attacks. Attack signatures<br />

are patterns that corresp<strong>on</strong>d to known types of intrusi<strong>on</strong>s. Network-based IDPSs also use other detecti<strong>on</strong><br />

methods to identify anomalous activity, protocol violati<strong>on</strong>s, and other unusual activity.<br />

Unlike a host-based IDPS, a network-based IDPS can m<strong>on</strong>itor network activity for many hosts<br />

simultaneously. Network-based IDPSs can usually detect more network-based attacks and can more<br />

easily provide a comprehensive picture of the current attacks against a network. Because network-based<br />

IDPSs are installed <strong>on</strong> dedicated hosts, they do not have a negative effect <strong>on</strong> the performance of the <strong>Web</strong><br />

server host and are not immediately compromised by a successful attack <strong>on</strong> the <strong>Web</strong> server.<br />

Network-based IDPSs do have some limitati<strong>on</strong>s. The timing of an attack can have a significant impact <strong>on</strong><br />

the ability of a network-based IDPS to detect an attack. For example, if an attacker spreads out the timing<br />

of an attack over a period of hours or days, the attack may not be detected by the IDPS. Network<br />

c<strong>on</strong>figurati<strong>on</strong>, such as the use of asymmetric routing, can have a negative impact <strong>on</strong> the ability of a<br />

68<br />

69<br />

For more informati<strong>on</strong> about IDPSs, see <str<strong>on</strong>g>NIST</str<strong>on</strong>g> SP <str<strong>on</strong>g>800</str<strong>on</strong>g>-94, Guide to Intrusi<strong>on</strong> Detecti<strong>on</strong> and Preventi<strong>on</strong> Systems (IDPS)<br />

(http://csrc.nist.gov/publicati<strong>on</strong>s/nistpubs/).<br />

Other major IDPS categories include wireless IDPS, which examines wireless networking protocols <strong>on</strong>ly, and network<br />

behavior anomaly detecti<strong>on</strong> software, which m<strong>on</strong>itors network traffic flows for flow anomalies. Neither of these types of<br />

IDPS technologies analyzes <strong>Web</strong> activity.<br />

8-9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!